Ratings and Reviews 2 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Auth0 Reviews & Ratings
    977 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    587 Ratings
    Company Website
  • Rippling Reviews & Ratings
    18,630 Ratings
    Company Website
  • Syncro Reviews & Ratings
    502 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    15 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    119 Ratings
    Company Website
  • Device42 Reviews & Ratings
    173 Ratings
    Company Website
  • D&B Risk Analytics Reviews & Ratings
    73 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    496 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website

What is SAP Access Control?

Equip employees with essential applications and services while protecting data and processes from unauthorized access. Streamline the management and verification of user access through governance tools that automate user provisioning and guarantee compliance with access certification for both on-premise applications and data. By incorporating preventive policy checks and monitoring emergency access, effective governance can be maintained. Automatically identify and rectify access risk violations within SAP and external systems, while integrating compliance checks and vital risk mitigation into daily operations. Enable user-initiated, workflow-driven access requests and approvals to promote transparency and efficiency throughout the process. Ensure accurate identification and resolution of issues surrounding segregation of duties and critical access by utilizing integrated risk analysis. Simplify user access assignments across SAP and third-party systems automatically, while establishing and preserving compliance roles in straightforward, business-friendly terms to improve understanding and adherence. This holistic approach not only reduces risks but also cultivates a secure and efficient operational atmosphere, ultimately leading to enhanced productivity and trust within the organization.

What is OpenText NetIQ Identity Governance?

Oversee the permissions to applications and data across your diverse enterprise infrastructure. Whether you choose an on-premises deployment or a SaaS model, you will gain access to a rich array of features that meet the expectations of a modern identity governance solution. Determine who holds access to vital applications and data, whether they are housed locally or in the cloud. By implementing Identity Governance, you can consolidate and visualize identities and permissions throughout your entire network, allowing you to understand who has access to what, who granted that access, and the reasons behind those decisions. This strategy keeps teams functioning efficiently by ensuring accurate and timely access to applications and data across your complex IT landscape. Moreover, Identity Governance lightens the load for your IT staff and application administrators, as they will no longer need to manage permissions for every single application and platform individually. You will enjoy a user-friendly, self-service platform for access requests and approvals, backed by automated processes for the most commonly used applications, ultimately enhancing operational efficiency within your organization. This solution also promotes greater accountability and security by offering thorough documentation of access rights and the approval chain, fostering a culture of transparency. Additionally, the insights gained from this system can drive better decision-making and risk management across your enterprise.

Media

Media

Integrations Supported

Asite
Axya
Brainwave GRC
Cloud Assess
Exegy SMDS
Funding Gates
KENT CamAttendance
Kkonnect.io
Krista
Kytes
PrintSmith Vision
Qualer
SnapAP
Splunk User Behavior Analytics
StarRez
Thrive Downtime Tracking Software
Uptempo
in-STEP BLUE

Integrations Supported

Asite
Axya
Brainwave GRC
Cloud Assess
Exegy SMDS
Funding Gates
KENT CamAttendance
Kkonnect.io
Krista
Kytes
PrintSmith Vision
Qualer
SnapAP
Splunk User Behavior Analytics
StarRez
Thrive Downtime Tracking Software
Uptempo
in-STEP BLUE

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

SAP

Date Founded

1972

Company Location

Germany

Company Website

www.sap.com/products/access-control.html

Company Facts

Organization Name

OpenText

Date Founded

1991

Company Location

Canada

Company Website

www.opentext.com/products/netiq-identity-governance

Categories and Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

Popular Alternatives

Bravura Identity Reviews & Ratings

Bravura Identity

Bravura Security
EzyWine PRO Reviews & Ratings

EzyWine PRO

Ezy Systems
Symantec IGA Reviews & Ratings

Symantec IGA

Broadcom
Visual Identity Suite Reviews & Ratings

Visual Identity Suite

Core Security (Fortra)
SPHEREboard Reviews & Ratings

SPHEREboard

SPHERE Technology Solutions
SailPoint Reviews & Ratings

SailPoint

SailPoint Technologies